A Secure Strategy for Location-Based Wireless Sensor Networks

Article Preview

Abstract:

A Secure Strategy for Location-Based Wireless Sensor N A cluster-based secure strategy for wireless sensor networks is proposed. The two-dimension sensing area comprises a number of clusters, each of which contains four small squares called cells. The WSNs structure is a two-layer structure. The upper layer consists of all cluster heads and the lower layer consists of all ordinary sensors managed by their cluster heads. The cluster heads establish their pairwise keys through utilizing a key pre-distribution scheme based on cluster head identifications and the ordinary sensors establish their pairwise keys through employing a dynamic key management strategy based on exclusion-based systems (EBSs). Analysis and comparison show this scheme enhances the WSNs security, decreases WSNs communication consumption, saves cluster head and sensor energy expenditure, and prolongs the lifetime of both cluster heads and ordinary sensors.etworks

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 631-632)

Pages:

1409-1415

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] L. Eschenauer, V. D. Gligor. A key-management scheme for distributed sensor networks", in Proc. CCS, 02: 9th ACM Conference on Computer and Communications Security. New York: ACM Press, Nov. 2002, pp.41-47, (2002).

DOI: 10.1145/586110.586117

Google Scholar

[2] H. Chan, A. Perrig, D. Song. Random key predistribution schemes for sensor networks, Proceedings of the IEEE Syrup. On Research in Security and Privacy, Berkeley, CA, USA, May 11-14 2003, pp.197-213, (2003).

Google Scholar

[3] M. F. Younis, K. Ghumman, M. Eltoweissy. Location-aware combinatorial key management scheme for clustered sensor networks, IEEE Trans. On Parallel and Distrib, 17(8): 865-882, (2006).

DOI: 10.1109/tpds.2006.106

Google Scholar

[4] R. Blundo, D. Suntisa, A. Herzbeg, et al. Perfectly secure key distribution for dynamic conferences, Proc. of the 12th Annual International Cryptology Conference on Advances in Cryptology. [s l]: Springer-Verlag, 1992, pp.471-486, (1992).

DOI: 10.1007/3-540-48071-4_33

Google Scholar

[5] M. Eltoweissy, H. Heydari, L. Morales, H. Sudborough. Combinatorial optimization of Group key management, Journal of Network and System Management, 12(1): 33-50, (2004).

DOI: 10.1023/b:jons.0000015697.38671.ec

Google Scholar

[6] M. Eltoweissy, M. Moharrum, R. Mukkamala. Dynamic key management in sensor networks, IEEE Communications Magazine , pp.122-130, (2006).

DOI: 10.1109/mcom.2006.1632659

Google Scholar

[7] C. Michael, P. Jung-Min, E. Mohamed. Key management for long-lived sensor networks in hostile environments, Computer communications, 30(3): 1964-1979, (2007).

DOI: 10.1016/j.comcom.2007.02.022

Google Scholar

[8] Z. Rui, L. Ji-qiang Z. Jia. An ID-based Key Pre-distribution Scheme for Wireless Sensor Networks, Journal of Electronics and Information Technology, 31(4): 929-932, (2009).

Google Scholar

[9] D Estrin. Wireless sensor networks tutorial part Ⅳ: sensor networkprotocols, http: /nesl. ee. ucla. edu/tutorials/ mobicom 02 slides/Mobicom-Tutorial-4-DE. pdf. 2007. 9 (2007).

Google Scholar